TWI810055B - Avatar attribute generating, inheriting and destroying system for real-name registration running in metaverse and method thereof - Google Patents
Avatar attribute generating, inheriting and destroying system for real-name registration running in metaverse and method thereof Download PDFInfo
- Publication number
- TWI810055B TWI810055B TW111133707A TW111133707A TWI810055B TW I810055 B TWI810055 B TW I810055B TW 111133707 A TW111133707 A TW 111133707A TW 111133707 A TW111133707 A TW 111133707A TW I810055 B TWI810055 B TW I810055B
- Authority
- TW
- Taiwan
- Prior art keywords
- metaverse
- real
- token
- homogeneous
- name
- Prior art date
Links
Images
Landscapes
- Processing Or Creating Images (AREA)
- Devices For Executing Special Programs (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
Description
本發明涉及一種分身屬性生成、繼承與消滅系統及其方法,特別是運行在元宇宙的實名制之分身屬性生成、繼承與消滅系統及其方法。The present invention relates to a system for generation, inheritance and elimination of avatar attributes and its method, in particular to a system and method for the generation, inheritance and elimination of avatar attributes of the real-name system running in the Metaverse.
近年來,隨著元宇宙(Metaverse)技術的普及與蓬勃發展,各種基於元宇宙的應用如雨後春筍般湧現。然而,如何在元宇宙內提升實名制的可利用性已經成為各家廠商亟欲解決的問題之一。In recent years, with the popularity and vigorous development of Metaverse technology, various Metaverse-based applications have sprung up like mushrooms. However, how to improve the usability of the real-name system in the metaverse has become one of the problems that manufacturers are eager to solve.
一般而言,傳統的元宇宙是非實名制的匿名世界,而為了避免元宇宙成為法外之地,或者有驗證使用者身分的需求時,發展實名制便成為理所當然之事。然而,目前的實名制是透過輸入帳號密碼來實現,此方式容易在密碼外洩時遭到冒用,而且容易造成密碼外洩導致身分遭到冒用的問題,故具有元宇宙實名制的可利用性不佳的問題。Generally speaking, the traditional metaverse is an anonymous world without a real-name system, and in order to prevent the metaverse from becoming a place outside the law, or when there is a need to verify the identity of users, it is a matter of course to develop a real-name system. However, the current real-name system is realized by entering the account password. This method is easy to be fraudulently used when the password is leaked, and it is easy to cause the problem of fraudulent use of the identity due to the leaked password. Therefore, it has the usability of the metaverse real-name system. Poor question.
綜上所述,可知先前技術中長期以來一直存在元宇宙實名制的可利用性不佳之問題,因此實有必要提出改進的技術手段,來解決此一問題。To sum up, it can be seen that there has been a problem of poor usability of the metaverse real name system in the prior art for a long time, so it is really necessary to propose improved technical means to solve this problem.
本發明揭露一種運行在元宇宙的實名制之分身屬性生成、繼承與消滅系統及其方法。The present invention discloses a real-name-based avatar attribute generation, inheritance and elimination system and method operating in the Metaverse.
首先,本發明揭露一種運行在元宇宙的實名制之分身屬性生成、繼承與消滅系統,應用在整合元宇宙及區塊鏈的環境中,此系統包含:生成模組、綁定模組、執行模組及驗證模組。其中,生成模組用以於初始時,在區塊鏈上生成同質化代幣,其中,同質化代幣具有分身屬性,並且由使用者持有的加密貨幣錢包控制同質化代幣;綁定模組連接生成模組,用以接收使用者的實名制身分訊息,並且將實名制身分訊息與同質化代幣綁定,使同質化代幣代表在元宇宙中的合法分身;執行模組連接綁定模組,用以當使用者在元宇宙中觸發不同的多個事件時,根據觸發的所述事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一,同時由加密貨幣錢包根據選擇結果對同質化代幣進行相應的控制,其中,當執行拆分時,將同質化代幣以預設比例增加同質化代幣的數量、當執行繼承時,將同質化代幣發送至被繼承者的加密貨幣錢包,以及當執行消滅時,將同質化代幣發送至黑洞地址;驗證模組連接執行模組,用以當同質化代幣的數量增加至N個時,每一所述同質化代幣皆具有相同的分身屬性,並且允許分別提供給不同事件作為身分驗證之用,其中,N為正整數。First of all, the present invention discloses a real-name avatar attribute generation, inheritance and elimination system running in the Metaverse, which is applied in the environment of integrating the Metaverse and the blockchain. This system includes: a generation module, a binding module, and an execution module group and verification module. Among them, the generation module is used to generate homogeneous tokens on the block chain at the beginning, wherein the homogenized tokens have avatar attributes, and the encrypted currency wallets held by users control the homogenized tokens; binding Module connection generation module, which is used to receive the user's real-name identity information, and bind the real-name identity information to the homogeneous token, so that the homogeneous token represents the legal avatar in the metaverse; execute the module connection binding The module is used to select at least one of splitting, inheriting and destroying homogeneous tokens according to the triggered events when the user triggers multiple different events in the metaverse, and at the same time, the encrypted currency wallet according to The result of the selection controls the homogeneous tokens accordingly. When splitting, the number of homogenized tokens is increased by a preset ratio; when inheritance is performed, the homogenized tokens are sent to the The successor’s cryptocurrency wallet, and when the execution is eliminated, send the homogeneous tokens to the black hole address; the verification module is connected to the execution module, so that when the number of homogeneous tokens increases to N, each of the Homogeneous tokens all have the same avatar attribute, and are allowed to be provided to different events for identity verification, where N is a positive integer.
另外,本發明還揭露一種運行在元宇宙的實名制之分身屬性生成、繼承與消滅方法,應用在整合元宇宙及區塊鏈的網路環境中,其步驟包括:於初始時,在區塊鏈上生成同質化代幣,其中,同質化代幣具有分身屬性,並且由使用者持有的加密貨幣錢包控制所述同質化代幣;接收使用者的實名制身分訊息,並且將此實名制身分訊息與同質化代幣綁定,使同質化代幣代表在元宇宙中的合法分身;當使用者在元宇宙中觸發不同的多個事件時,根據觸發的所述事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一,同時由加密貨幣錢包根據選擇結果對同質化代幣進行相應的控制,其中,當執行拆分時,將同質化代幣以預設比例增加同質化代幣的數量、當執行繼承時,將同質化代幣發送至被繼承者的加密貨幣錢包,以及當執行消滅時,將同質化代幣發送至黑洞地址;以及當同質化代幣的數量增加至N個時,每一所述同質化代幣皆具有相同的分身屬性,並且允許分別提供給不同所述事件作為身分驗證之用,其中,N為正整數。In addition, the present invention also discloses a method for generating, inheriting and destroying avatar attributes under the real-name system running in the Metaverse, which is applied in the network environment integrating the Metaverse and the blockchain. The steps include: Generate homogeneous tokens on the above, wherein the homogeneous tokens have avatar attributes, and the encrypted currency wallet held by the user controls the homogeneous tokens; receive the real-name identity information of the user, and combine the real-name identity information with the Binding of homogenized tokens, so that homogenized tokens represent the legal avatar in the metaverse; when users trigger different events in the metaverse, they choose to perform dismantling of homogenized tokens according to the triggered events. Divide, inherit and eliminate at least one of them, and at the same time, the cryptocurrency wallet will control the homogeneous tokens according to the selection results, wherein, when the split is performed, the homogenized tokens will be increased by a preset ratio , when the inheritance is executed, the homogenized tokens are sent to the encrypted currency wallet of the heir, and when the elimination is executed, the homogenized tokens are sent to the black hole address; and when the number of homogenized tokens increases to N At this time, each of the homogeneous tokens has the same avatar attribute, and is allowed to be provided to different events for identity verification, wherein, N is a positive integer.
本發明所揭露之系統與方法如上,與先前技術的差異在於本發明是透過生成具有分身屬性的同質化代幣,並且通過分身屬性綁定同質化代幣與實名制身分訊息,使同質化代幣代表元宇宙中的合法分身,當使用者觸發事件時,根據觸發事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一。The system and method disclosed in the present invention are as above, and the difference from the prior art is that the present invention generates homogeneous tokens with avatar attributes, and binds homogeneous tokens and real-name identity information through avatar attributes, so that homogenized tokens Represents the legal avatar in the metaverse. When the user triggers an event, he or she will choose to split, inherit or eliminate at least one of the homogenized tokens according to the trigger event.
透過上述的技術手段,本發明可以達成提升元宇宙實名制的可利用性之技術功效。Through the above-mentioned technical means, the present invention can achieve the technical effect of improving the usability of the metaverse real-name system.
以下將配合圖式及實施例來詳細說明本發明之實施方式,藉此對本發明如何應用技術手段來解決技術問題並達成技術功效的實現過程能充分理解並據以實施。The implementation of the present invention will be described in detail below in conjunction with the drawings and examples, so as to fully understand and implement the implementation process of how the present invention uses technical means to solve technical problems and achieve technical effects.
請先參閱「第1圖」,「第1圖」為本發明運行在元宇宙的實名制之分身屬性生成、繼承與消滅系統的系統方塊圖,應用在整合元宇宙及區塊鏈的環境中,此系統包含:生成模組110、綁定模組120、執行模組130及驗證模組140。其中,生成模組110用以於初始時,在區塊鏈上生成同質化代幣,例如:根據 ERC20 標準鑄造(Mint)同質化代幣,所述同質化代幣具有分身屬性,並且由使用者持有的加密貨幣錢包控制生成的同質化代幣。在實際實施上,所述分身屬性可包含唯一識別碼,由於是同質化代幣,所以即使將一個同質化代幣拆分為多個同質化代幣時,每一個同質化代幣的分身屬性所包含的唯一識別碼也會相同。Please refer to "Figure 1" first. "Figure 1" is a system block diagram of the real-name avatar attribute generation, inheritance and elimination system of the present invention running in the metaverse, and it is applied in the environment of integrating metaverse and blockchain. The system includes: a
綁定模組120連接生成模組110,用以接收使用者的實名制身分訊息,並且將實名制身分訊息與同質化代幣綁定,使同質化代幣代表在元宇宙中的合法分身。在實際實施上,當綁定模組120接收到實名制身分訊息時,可執行雜湊函式及編碼函式以對實名制身分訊息進行雜湊及編碼,舉例來說,可先執行雜湊函式「SHA-256」對實名制身分訊息進行雜湊,再執行編碼函式「Base64」對雜湊結果進行編碼,用以生成同質化代幣的分身屬性所包含的唯一識別碼,進而完成實名制身分訊息與同質化代幣的綁定,也就是說,由於分身屬性的唯一識別碼是基於實名制身分訊息所生成,所以具有此分身屬性的同質化代幣皆視為與實名制身分訊息綁定。The
執行模組130連接綁定模組120,用以當使用者在元宇宙中觸發不同的多個事件時,根據觸發的所述事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一,同時由加密貨幣錢包根據選擇結果對同質化代幣進行相應的控制,其中,當執行拆分時,將同質化代幣以預設比例增加同質化代幣的數量、當執行繼承時,將同質化代幣發送至被繼承者的加密貨幣錢包,以及當執行消滅時,將同質化代幣發送至黑洞地址。在實際實施上,所述事件包含在不同元宇宙之間切換時所觸發的拆分事件、使用者在元宇宙執行數位遺產設定時所觸發的繼承事件,以及使用者在元宇宙執行反註冊程序時所觸發的消滅事件。以拆分事件為例,假設使用者在元宇宙中收到N個驗證請求,執行模組130會將其視為拆分事件,並且以預設比例(1:N)增加所述同質化代幣的數量,例如:將一個同質化代幣增加(即:拆分)為N個同質化代幣,以利後續分別將各個同質化代幣發送給發出驗證請求者的加密貨幣錢包以作為回應驗證請求之用。除此之外,假設使用者在M個元宇宙擁有M個加密貨幣錢包,當使用者從第i個元宇宙移動或切換至第j個元宇宙時將觸發拆分事件,此時,執行模組130會增加第i個元宇宙的同質化代幣的數量,以及將增加的第i個元宇宙的同質化代幣發送至第j個元宇宙的加密貨幣錢包,其中,M、i及j為正整數。The
驗證模組140連接執行模組130,用以當同質化代幣的數量增加至N個時,每一所述同質化代幣皆具有相同的分身屬性,並且允許分別提供給不同事件作為身分驗證之用,其中,N為正整數。舉例來說,假設使用者觸發5個身分驗證事件,執行模組130會選擇對同質化代幣執行拆分,使其數量增加至5個,使用者可以將這5個同質化代幣分別傳送給不同的5個身分驗證事件,也就是說為每一個事件提供一個同質化代幣以取代傳統提供帳號密碼的方式,在驗證過程中,可以根據是否成功獲得同質化代幣及其分身屬性來驗證使用者的真實身分。另外,所述同質化代幣提供給事件時,可在區塊鏈上即時記錄當前的時間訊息、網路位址及綁定的實名制身分訊息以供追朔。The
特別要說明的是,在實際實施上,本發明所述的模組皆可利用各種方式來實現,包含軟體、硬體或其任意組合,例如,在某些實施方式中,各模組可利用軟體及硬體或其中之一來實現,除此之外,本發明亦可部分地或完全地基於硬體來實現,例如,系統中的一個或多個模組可以透過積體電路晶片、系統單晶片、複雜可程式邏輯裝置(Complex Programmable Logic Device, CPLD)、現場可程式邏輯閘陣列(Field Programmable Gate Array, FPGA)等來實現。本發明可以是系統、方法及/或電腦程式。電腦程式可以包括電腦可讀儲存媒體,其上載有用於使處理器實現本發明的各個方面的電腦可讀程式指令,電腦可讀儲存媒體可以是可以保持和儲存由指令執行設備使用的指令的有形設備。電腦可讀儲存媒體可以是但不限於電儲存設備、磁儲存設備、光儲存設備、電磁儲存設備、半導體儲存設備或上述的任意合適的組合。電腦可讀儲存媒體的更具體的例子(非窮舉的列表)包括:硬碟、隨機存取記憶體、唯讀記憶體、快閃記憶體、光碟、軟碟以及上述的任意合適的組合。此處所使用的電腦可讀儲存媒體不被解釋爲瞬時信號本身,諸如無線電波或者其它自由傳播的電磁波、通過波導或其它傳輸媒介傳播的電磁波(例如,通過光纖電纜的光信號)、或者通過電線傳輸的電信號。另外,此處所描述的電腦可讀程式指令可以從電腦可讀儲存媒體下載到各個計算/處理設備,或者通過網路,例如:網際網路、區域網路、廣域網路及/或無線網路下載到外部電腦設備或外部儲存設備。網路可以包括銅傳輸電纜、光纖傳輸、無線傳輸、路由器、防火牆、交換器、集線器及/或閘道器。每一個計算/處理設備中的網路卡或者網路介面從網路接收電腦可讀程式指令,並轉發此電腦可讀程式指令,以供儲存在各個計算/處理設備中的電腦可讀儲存媒體中。執行本發明操作的電腦程式指令可以是組合語言指令、指令集架構指令、機器指令、機器相關指令、微指令、韌體指令、或者以一種或多種程式語言的任意組合編寫的原始碼或目的碼(Object Code),所述程式語言包括物件導向的程式語言,如:Common Lisp、Python、C++、Objective-C、Smalltalk、Delphi、Java、Swift、C#、Perl、Ruby與PHP等,以及常規的程序式(Procedural)程式語言,如:C語言或類似的程式語言。所述電腦程式指令可以完全地在電腦上執行、部分地在電腦上執行、作爲一個獨立的軟體執行、部分在客戶端電腦上部分在遠端電腦上執行、或者完全在遠端電腦或伺服器上執行。In particular, it should be noted that in actual implementation, the modules described in the present invention can be implemented in various ways, including software, hardware or any combination thereof. For example, in some implementations, each module can use software and hardware or one of them. In addition, the present invention can also be realized partially or completely based on hardware. For example, one or more modules in the system can be implemented through integrated circuit chips, system Single chip, complex programmable logic device (Complex Programmable Logic Device, CPLD), field programmable logic gate array (Field Programmable Gate Array, FPGA) and so on. The present invention can be a system, method and/or computer program. The computer program may include a computer-readable storage medium loaded with computer-readable program instructions for causing a processor to implement various aspects of the present invention, the computer-readable storage medium may be a tangible and equipment. A computer readable storage medium may be, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (non-exhaustive list) of computer-readable storage media include hard disks, random access memory, read-only memory, flash memory, optical disks, floppy disks, and any suitable combination of the foregoing. As used herein, computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (for example, optical signals through fiber optic cables), or transmitted electrical signals. Additionally, the computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to various computing/processing devices, or downloaded over a network, such as the Internet, local area network, wide area network, and/or wireless network to an external computer device or external storage device. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, hubs and/or gateways. The network card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in computer-readable storage media in each computing/processing device middle. The computer program instructions for performing the operations of the present invention may be assembly language instructions, instruction set architecture instructions, machine instructions, machine-related instructions, micro instructions, firmware instructions, or source code or object code written in any combination of one or more programming languages (Object Code), the programming language includes object-oriented programming languages, such as: Common Lisp, Python, C++, Objective-C, Smalltalk, Delphi, Java, Swift, C#, Perl, Ruby and PHP, etc., as well as conventional programs Procedural programming language, such as: C language or similar programming language. The computer program instructions may be executed entirely on the computer, partly on the computer, as a stand-alone piece of software, partly on the client computer and partly on the remote computer, or entirely on the remote computer or server to execute.
請參閱「第2圖」,「第2圖」為本發明運行在元宇宙的實名制之分身屬性生成、繼承與消滅方法的方法流程圖,應用在整合元宇宙及區塊鏈的網路環境中,其步驟包括:於初始時,在區塊鏈上生成同質化代幣,其中,同質化代幣具有分身屬性,並且由使用者持有的加密貨幣錢包控制所述同質化代幣(步驟210);接收使用者的實名制身分訊息,並且將此實名制身分訊息與同質化代幣綁定,使同質化代幣代表在元宇宙中的合法分身(步驟220);當使用者在元宇宙中觸發不同的多個事件時,根據觸發的所述事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一,同時由加密貨幣錢包根據選擇結果對同質化代幣進行相應的控制,其中,當執行拆分時,將同質化代幣以預設比例增加同質化代幣的數量、當執行繼承時,將同質化代幣發送至被繼承者的加密貨幣錢包,以及當執行消滅時,將同質化代幣發送至黑洞地址(步驟230);當同質化代幣的數量增加至N個時,每一所述同質化代幣皆具有相同的分身屬性,並且允許分別提供給不同所述事件作為身分驗證之用,其中,N為正整數(步驟240)。如此一來,便能透過生成具有分身屬性的同質化代幣,並且通過分身屬性綁定同質化代幣與實名制身分訊息,使同質化代幣代表元宇宙中的合法分身,當使用者觸發事件時,根據觸發事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一。Please refer to "Figure 2", "Figure 2" is a flow chart of the method of generating, inheriting and destroying the avatar attributes of the real-name system of the present invention running in the metaverse, and it is applied in the network environment integrating metaverse and blockchain , the steps include: initially, generating homogeneous tokens on the block chain, wherein the homogeneous tokens have avatar attributes, and the encrypted currency wallet held by the user controls the homogeneous tokens (step 210 ); receive the user's real-name identity information, and bind this real-name identity information to the homogeneous token, so that the homogeneous token represents the legal avatar in the metaverse (step 220); when the user triggers in the metaverse When there are multiple different events, at least one of splitting, inheritance, and elimination of homogenized tokens is selected according to the triggered event, and at the same time, the encrypted currency wallet controls the homogenized tokens according to the selection result, wherein , when performing splitting, increase the number of homogenizing tokens by a preset ratio, when performing inheritance, send homogenizing tokens to the encrypted currency wallet of the inheritor, and when performing elimination, Send the homogeneous tokens to the black hole address (step 230); when the number of homogenized tokens increases to N, each of the homogenized tokens has the same avatar attribute, and is allowed to be provided to different said The event is used for identity verification, wherein, N is a positive integer (step 240). In this way, by generating homogenized tokens with avatar attributes, and binding homogenized tokens with real-name identity information through avatar attributes, homogenized tokens can represent legal avatars in the Metaverse. When users trigger events , select at least one of the split, inheritance and elimination of the homogeneous tokens according to the trigger event.
以下配合「第3圖」及「第4圖」以實施例的方式進行如下說明,請先參閱「第3圖」,「第3圖」為應用本發明綁定同質化代幣與實名制身分訊息之示意圖。在實際實施上,由於同質化代幣具有分身屬性,此分身屬性可包含唯一識別碼,為了綁定同質化代幣與實名制身分訊息,可以基於實名制身分訊息生成分身屬性所包含的唯一識別碼,進而完成分身屬性的生成。舉例來說,執行雜湊函式,如:「MD5」,用以對實名制身分訊息310進行雜湊以獲得雜湊結果320,接著,執行編碼函式,如:「Base64」,對雜湊結果320進行編碼以獲得分身屬性所包含的唯一識別碼330。至此,即完成同質化代幣與實名制身分訊息的綁定。同時,亦可避免實名制身分訊息以明碼的方式記錄於區塊鏈上,導致個資外洩的問題。The following description will be made in the form of an embodiment in conjunction with "Figure 3" and "Figure 4". Please refer to "Figure 3" first. The schematic diagram. In actual implementation, since the homogeneous token has the avatar attribute, this avatar attribute can contain a unique identification code. In order to bind the homogenized token and the real-name identity information, the unique identification code contained in the avatar attribute can be generated based on the real-name identity information. And then complete the generation of avatar attributes. For example, execute a hash function, such as "MD5", to hash the real-
如「第4圖」所示意,「第4圖」為應用本發明根據觸發事件控制同質化代幣之示意圖。在實際實施上,觸發的事件可分為拆分事件、繼承事件及消滅事件。其中,拆分事件是指需要將一個同質化代幣拆分成多個的事件,例如:每次接收到一個驗證請求便觸發一次拆分事件,使執行模組130將同質化代幣以預設比例,如:「1:2」,增加同質化代幣的數量,並且將增加的同質化代幣通過區塊鏈交易發送至發出驗證請求者的加密貨幣錢包。如此一來,發出驗證請求者可以從成功收到的同質化代幣的分身屬性來驗證使用者身分,舉例來說,假設發出驗證請求者欲驗證使用者的實名制身分訊息是否為「A123456789」,發出驗證請求者可將此實名制身分訊息經過雜湊及編碼處理後獲得一個待驗證訊息,接著,將接收自使用者的同質化代幣的分身屬性所包含的唯一識別碼與待驗證訊息進行比對,倘若兩者符合即代表驗證通過,反之則代表驗證失敗。上述方式亦可應用在同時具有多個不同元宇宙的環境中,以兩個元宇宙(即:第一元宇宙410及第二元宇宙420)與相同的區塊鏈網路400(如:以太坊)整合為例,使用者在第一元宇宙410擁有第一加密貨幣錢包411(錢包地址為「0x43327……」),第二元宇宙420擁有第二加密貨幣錢包421(錢包地址為「0x28165……」)。當使用者從第一元宇宙410移動或切換至第二元宇宙420時即觸發拆分事件,此時,執行模組130會增加第一元宇宙410的同質化代幣的數量,例如:增加一個單位。接著,將增加的同質化代幣從第一加密貨幣錢包411發送至第二加密貨幣錢包421。如此一來,使用者便可在第二元宇宙420中,以第二加密貨幣錢包421收到的同質化代幣作為身分驗證的依據。As shown in "Figure 4", "Figure 4" is a schematic diagram of applying the present invention to control homogeneous tokens according to trigger events. In actual implementation, the triggered events can be divided into splitting events, inheritance events and elimination events. Among them, the splitting event refers to an event that needs to split a homogeneous token into multiple ones, for example: each time a verification request is received, a splitting event is triggered, so that the
另外,假設使用者在元宇宙執行數位遺產設定,此時將觸發繼承事件,其中,數位遺產設定包含指定繼承條件,例如:設定使用者五年未登入視為使用者往生,此時,將使用者的同質化代幣作為數位遺產轉移至繼承者的某加密貨幣錢包。如此一來,當滿足繼承事件時,便自動將同質化代幣轉移至預先設定的繼承者的某加密貨幣錢包以完成繼承。最後,假設使用者在元宇宙執行反註冊程序,即觸發消滅事件,執行模組130會將使用者的所有同質化代幣發送至黑洞地址,也就是說,任何人都無法使用這些同質化代幣。In addition, assuming that the user executes the digital legacy setting in the metaverse, an inheritance event will be triggered at this time. The digital legacy setting includes specified inheritance conditions. For example, it is set that the user has not logged in for five years. The homogenized tokens of the successor are transferred to a certain cryptocurrency wallet of the successor as a digital inheritance. In this way, when the succession event is met, the homogeneous tokens will be automatically transferred to a preset cryptocurrency wallet of the successor to complete the succession. Finally, assuming that the user executes the anti-registration program in the metaverse, that is, triggers the elimination event, the
綜上所述,可知本發明與先前技術之間的差異在於透過生成具有分身屬性的同質化代幣,並且通過分身屬性綁定同質化代幣與實名制身分訊息,使同質化代幣代表元宇宙中的合法分身,當使用者觸發事件時,根據觸發事件選擇對同質化代幣執行拆分、繼承及消滅至少其中之一,藉由此一技術手段可以解決先前技術所存在的問題,進而達成提升元宇宙實名制的可利用性之技術功效。To sum up, it can be seen that the difference between the present invention and the prior art lies in the generation of homogeneous tokens with avatar attributes, and binding of homogenized tokens and real-name identity information through avatar attributes, so that homogeneous tokens represent the Metaverse In the legal avatar, when the user triggers an event, at least one of the split, inheritance, and elimination of homogenized tokens is selected according to the trigger event. This technical means can solve the problems existing in the previous technology, and then achieve The technical effect of improving the usability of the metaverse real name system.
雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明,任何熟習相像技藝者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之專利保護範圍須視本說明書所附之申請專利範圍所界定者為準。Although the present invention is disclosed above with the aforementioned embodiments, it is not intended to limit the present invention. Any person familiar with similar skills may make some changes and modifications without departing from the spirit and scope of the present invention. Therefore, the present invention The scope of patent protection shall be subject to what is defined in the scope of patent application attached to this manual.
110:生成模組 120:綁定模組 130:執行模組 140:驗證模組 310:實名制身分訊息 320:雜湊結果 330:唯一識別碼 400:區塊鏈網路 410:第一元宇宙 411:第一加密貨幣錢包 420:第二元宇宙 421:第二加密貨幣錢包 步驟210:於初始時,在區塊鏈上生成一同質化代幣,其中,該同質化代幣具有一分身屬性,並且由一使用者持有的一加密貨幣錢包控制該同質化代幣 步驟220:接收該使用者的一實名制身分訊息,並且將該實名制身分訊息與該同質化代幣綁定,使該同質化代幣代表在元宇宙中的合法分身 步驟230:當該使用者在元宇宙中觸發不同的多個事件時,根據觸發的所述事件選擇對該同質化代幣執行拆分、繼承及消滅至少其中之一,同時由該加密貨幣錢包根據選擇結果對該同質化代幣進行相應的控制,其中,當執行拆分時,將該同質化代幣以一預設比例增加該同質化代幣的數量、當執行繼承時,將該同質化代幣發送至被繼承者的該加密貨幣錢包,以及當執行消滅時,將該同質化代幣發送至一黑洞地址 步驟240:當該同質化代幣的數量增加至N個時,每一所述同質化代幣皆具有相同的該分身屬性,並且允許分別提供給不同所述事件作為身分驗證之用,其中,N為正整數110: Generate mods 120: Binding Module 130:Execution module 140: Verification module 310: Real-name identity information 320: hash result 330: unique identification code 400: Blockchain network 410: The First Universe 411: The first cryptocurrency wallet 420: Second Universe 421:Second cryptocurrency wallet Step 210: At the beginning, generate a homogeneous token on the blockchain, wherein the homogeneous token has an avatar attribute, and the homogeneous token is controlled by an encrypted currency wallet held by a user Step 220: Receive a real-name identity message of the user, and bind the real-name identity message with the homogeneous token, so that the homogeneous token represents the legal clone in the Metaverse Step 230: When the user triggers multiple different events in the Metaverse, select at least one of splitting, inheriting, and destroying the homogenized token according to the triggered event, and at the same time, the encrypted currency wallet According to the selection result, the homogeneous token is controlled accordingly, wherein, when splitting, the number of the homogenized token is increased by a preset ratio; when the inheritance is performed, the homogenized token is Send the homogenized tokens to the cryptocurrency wallet of the heir, and send the homogenized tokens to a black hole address when performing annihilation Step 240: When the number of the homogenized tokens increases to N, each of the homogenized tokens has the same avatar attribute, and is allowed to be provided to different events for identity verification, wherein, N is a positive integer
第1圖為本發明運行在元宇宙的實名制之分身屬性生成、繼承與消滅系統的系統方塊圖。 第2圖為本發明運行在元宇宙的實名制之分身屬性生成、繼承與消滅方法的方法流程圖。 第3圖為應用本發明綁定同質化代幣與實名制身分訊息之示意圖。 第4圖為應用本發明根據觸發事件控制同質化代幣之示意圖。 Figure 1 is a system block diagram of the real-name-based avatar attribute generation, inheritance and elimination system of the present invention running in the Metaverse. Fig. 2 is a method flow chart of the method of generating, inheriting and destroying the attributes of the real-name system of the present invention operating in the Metaverse. Figure 3 is a schematic diagram of applying the present invention to bind homogeneous tokens and real-name identity information. Figure 4 is a schematic diagram of applying the present invention to control homogeneous tokens according to trigger events.
110:生成模組 110: Generate mods
120:綁定模組 120: Binding Module
130:執行模組 130:Execution module
140:驗證模組 140: Verification module
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW111133707A TWI810055B (en) | 2022-09-06 | 2022-09-06 | Avatar attribute generating, inheriting and destroying system for real-name registration running in metaverse and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW111133707A TWI810055B (en) | 2022-09-06 | 2022-09-06 | Avatar attribute generating, inheriting and destroying system for real-name registration running in metaverse and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI810055B true TWI810055B (en) | 2023-07-21 |
TW202412489A TW202412489A (en) | 2024-03-16 |
Family
ID=88149526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW111133707A TWI810055B (en) | 2022-09-06 | 2022-09-06 | Avatar attribute generating, inheriting and destroying system for real-name registration running in metaverse and method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI810055B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
US20160283941A1 (en) * | 2015-03-27 | 2016-09-29 | Black Gold Coin, Inc. | Systems and methods for personal identification and verification |
CN106097006A (en) * | 2016-06-09 | 2016-11-09 | 杭州复杂美科技有限公司 | Block chain charge mode |
TW202223793A (en) * | 2020-09-30 | 2022-06-16 | 瑞士商區塊鏈授權股份有限公司 | Verification system and method |
-
2022
- 2022-09-06 TW TW111133707A patent/TWI810055B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283941A1 (en) * | 2015-03-27 | 2016-09-29 | Black Gold Coin, Inc. | Systems and methods for personal identification and verification |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN106097006A (en) * | 2016-06-09 | 2016-11-09 | 杭州复杂美科技有限公司 | Block chain charge mode |
TW202223793A (en) * | 2020-09-30 | 2022-06-16 | 瑞士商區塊鏈授權股份有限公司 | Verification system and method |
Also Published As
Publication number | Publication date |
---|---|
TW202412489A (en) | 2024-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10790980B2 (en) | Establishing trust in an attribute authentication system | |
JP7030981B2 (en) | Asset management methods and equipment, and electronic devices | |
JP6756051B2 (en) | Reliable login methods, servers, and systems | |
US10938924B1 (en) | Systems and methods related to executing transactions in a hybrid cloud environment | |
CN106096343B (en) | Message access control method and equipment | |
US8955045B2 (en) | Facilitating varied access based on authentication scoring | |
CN110888938A (en) | Student identity information processing method and device based on block chain network | |
US9137234B2 (en) | System and method for providing a certificate based on granted permissions | |
US10963869B2 (en) | System and method of cryptographically provable zero knowledge social networking | |
CN108924125A (en) | Control method, device, computer equipment and the storage medium of interface calling permission | |
KR20110122731A (en) | Introducing encryption, authentication, and authorization into a publication and subscription engine | |
CN106716957A (en) | Efficient and reliable attestation | |
US11431511B2 (en) | Centralized authentication and authorization with certificate management | |
CN110569658A (en) | User information processing method and device based on block chain network, electronic equipment and storage medium | |
US20180198620A1 (en) | Systems and methods for assuring data on leased computing resources | |
CN110163751A (en) | Block chain access system and its implementation towards alliance's chain | |
CN110768967A (en) | Service authorization method, device, equipment and system | |
US11979393B2 (en) | Customizable authentication system | |
US8793773B2 (en) | System and method for providing reputation reciprocity with anonymous identities | |
US20220150273A1 (en) | System and method for cyber training | |
CN107483987A (en) | A kind of method for authenticating and device of video flowing address | |
CN110447033A (en) | The certification of limitation is accessed based on client | |
KR20160018554A (en) | Roaming internet-accessible application state across trusted and untrusted platforms | |
CN110544042A (en) | Book management method and device based on block chain network | |
US11151551B2 (en) | Systems and methods related to executing transactions in a hybrid cloud environment |